"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-18 01:27:32 +00:00
parent 75c2800702
commit 945bd1d05a
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
56 changed files with 3661 additions and 3661 deletions

View File

@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "20020125 Identifying PGP Corporate Desktop 7.1 with PGPfire Personal Desktop Firewall installed (no need to be enabled) on Microsoft Windows Based OSs",
"refsource" : "BUGTRAQ",
"url" : "http://online.securityfocus.com/archive/1/252407"
},
{
"name": "3961",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/3961"
},
{
"name": "20020125 Identifying PGP Corporate Desktop 7.1 with PGPfire Personal Desktop Firewall installed (no need to be enabled) on Microsoft Windows Based OSs",
"refsource": "BUGTRAQ",
"url": "http://online.securityfocus.com/archive/1/252407"
},
{
"name": "pgpfire-icmp-fingerprint(8008)",
"refsource": "XF",

View File

@ -52,90 +52,90 @@
},
"references": {
"reference_data": [
{
"name" : "20020626 Revised OpenSSH Security Advisory (adv.iss)",
"refsource" : "BUGTRAQ",
"url" : "http://marc.info/?l=bugtraq&m=102514631524575&w=2"
},
{
"name" : "20020626 OpenSSH Security Advisory (adv.iss)",
"refsource" : "BUGTRAQ",
"url" : "http://marc.info/?l=bugtraq&m=102514371522793&w=2"
},
{
"name" : "20020627 How to reproduce OpenSSH Overflow.",
"refsource" : "BUGTRAQ",
"url" : "http://marc.info/?l=bugtraq&m=102521542826833&w=2"
},
{
"name" : "20020628 Sun statement on the OpenSSH Remote Challenge Vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://marc.info/?l=bugtraq&m=102532054613894&w=2"
},
{
"name" : "VU#369347",
"refsource" : "CERT-VN",
"url" : "http://www.kb.cert.org/vuls/id/369347"
},
{
"name" : "CA-2002-18",
"refsource" : "CERT",
"url" : "http://www.cert.org/advisories/CA-2002-18.html"
},
{
"name": "DSA-134",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2002/dsa-134"
},
{
"name" : "HPSBUX0206-195",
"refsource" : "HP",
"url" : "http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX0206-195"
},
{
"name" : "5093",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/5093"
},
{
"name" : "RHSA-2002:131",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2002-131.html"
},
{
"name" : "CSSA-2002-030.0",
"refsource" : "CALDERA",
"url" : "ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-030.0.txt"
},
{
"name" : "CLA-2002:502",
"refsource" : "CONECTIVA",
"url" : "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000502"
},
{
"name" : "ESA-20020702-016",
"refsource" : "ENGARDE",
"url" : "http://www.linuxsecurity.com/advisories/other_advisory-2177.html"
},
{
"name" : "MDKSA-2002:040",
"refsource" : "MANDRAKE",
"url" : "http://www.mandrakesoft.com/security/advisories?name=MDKSA-2002:040"
},
{
"name" : "SuSE-SA:2002:024",
"refsource" : "SUSE",
"url" : "http://www.novell.com/linux/security/advisories/2002_024_openssh_txt.html"
},
{
"name": "RHSA-2002:127",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2002-127.html"
},
{
"name": "20020626 OpenSSH Security Advisory (adv.iss)",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=102514371522793&w=2"
},
{
"name": "SuSE-SA:2002:024",
"refsource": "SUSE",
"url": "http://www.novell.com/linux/security/advisories/2002_024_openssh_txt.html"
},
{
"name": "20020628 Sun statement on the OpenSSH Remote Challenge Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=102532054613894&w=2"
},
{
"name": "839",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/839"
},
{
"name": "CA-2002-18",
"refsource": "CERT",
"url": "http://www.cert.org/advisories/CA-2002-18.html"
},
{
"name": "20020627 How to reproduce OpenSSH Overflow.",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=102521542826833&w=2"
},
{
"name": "RHSA-2002:131",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2002-131.html"
},
{
"name": "5093",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/5093"
},
{
"name": "CSSA-2002-030.0",
"refsource": "CALDERA",
"url": "ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-030.0.txt"
},
{
"name": "ESA-20020702-016",
"refsource": "ENGARDE",
"url": "http://www.linuxsecurity.com/advisories/other_advisory-2177.html"
},
{
"name": "VU#369347",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/369347"
},
{
"name": "CLA-2002:502",
"refsource": "CONECTIVA",
"url": "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000502"
},
{
"name": "HPSBUX0206-195",
"refsource": "HP",
"url": "http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX0206-195"
},
{
"name": "MDKSA-2002:040",
"refsource": "MANDRAKE",
"url": "http://www.mandrakesoft.com/security/advisories?name=MDKSA-2002:040"
},
{
"name": "20020626 Revised OpenSSH Security Advisory (adv.iss)",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=102514631524575&w=2"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "20020712 The answer to the PIX encryption issue",
"refsource" : "BUGTRAQ",
"url" : "http://marc.info/?l=bugtraq&m=102651159507659&w=2"
},
{
"name": "20020621 [VulnWatch] Weak Cisco Pix Password Encryption Algorithm",
"refsource": "VULNWATCH",
"url": "http://archives.neohapsis.com/archives/vulnwatch/2002-q2/0121.html"
},
{
"name": "20020712 The answer to the PIX encryption issue",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=102651159507659&w=2"
}
]
}

View File

@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "yabb-invalid-thread-xss(9408)",
"refsource": "XF",
"url": "http://www.iss.net/security_center/static/9408.php"
},
{
"name": "20020621 [AP] YaBB Cross-Site Scripting vulnerability",
"refsource": "BUGTRAQ",
@ -61,11 +66,6 @@
"name": "5078",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/5078"
},
{
"name" : "yabb-invalid-thread-xss(9408)",
"refsource" : "XF",
"url" : "http://www.iss.net/security_center/static/9408.php"
}
]
}

View File

@ -53,24 +53,24 @@
"references": {
"reference_data": [
{
"name" : "20020923 iDEFENSE Security Advisory 09.23.2002: Directory Traversal in Dino's Webserver",
"refsource" : "BUGTRAQ",
"url" : "http://marc.info/?l=bugtraq&m=103281444824285&w=2"
"name": "5782",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/5782"
},
{
"name": "20020923 iDEFENSE Security Advisory 09.23.2002: Directory Traversal in Dino's Webserver",
"refsource": "VULNWATCH",
"url": "http://archives.neohapsis.com/archives/vulnwatch/2002-q3/0127.html"
},
{
"name": "20020923 iDEFENSE Security Advisory 09.23.2002: Directory Traversal in Dino's Webserver",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=103281444824285&w=2"
},
{
"name": "dinos-dotdot-directory-traversal(10168)",
"refsource": "XF",
"url": "http://www.iss.net/security_center/static/10168.php"
},
{
"name" : "5782",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/5782"
}
]
}

View File

@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "tftp-udp-datagram-bo(10462)",
"refsource": "XF",
"url": "http://www.iss.net/security_center/static/10462.php"
},
{
"name": "20021024 TFTP Server DoS",
"refsource": "BUGTRAQ",
@ -66,11 +71,6 @@
"name": "6043",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/6043"
},
{
"name" : "tftp-udp-datagram-bo(10462)",
"refsource" : "XF",
"url" : "http://www.iss.net/security_center/static/10462.php"
}
]
}

View File

@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "pointsec-palmos-plaintext-pin(9021)",
"refsource": "XF",
"url": "http://www.iss.net/security_center/static/9021.php"
},
{
"name": "20020507 KPMG-2002018: Pointsec for PalmOS PIN disclosure",
"refsource": "BUGTRAQ",
@ -61,11 +66,6 @@
"name": "4681",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/4681"
},
{
"name" : "pointsec-palmos-plaintext-pin(9021)",
"refsource" : "XF",
"url" : "http://www.iss.net/security_center/static/9021.php"
}
]
}

View File

@ -53,29 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20050415 Use of function \"log\" in Perl module Net::Server",
"refsource" : "FULLDISC",
"url" : "http://marc.info/?l=full-disclosure&m=111354538331167&w=2"
},
{
"name" : "[postgrey] 20050414 Problem with crashing postgrey",
"refsource" : "MLIST",
"url" : "http://lists.ee.ethz.ch/postgrey/msg00627.html"
},
{
"name" : "[postgrey] 20050414 Re: Problem with crashing postgrey",
"refsource" : "MLIST",
"url" : "http://lists.ee.ethz.ch/postgrey/msg00630.html"
},
{
"name" : "[postgrey] 20050414 ANNOUNCE: Postgrey 1.21 (SECURITY)",
"refsource" : "MLIST",
"url" : "http://lists.ee.ethz.ch/postgrey/msg00647.html"
},
{
"name" : "DSA-1121",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2006/dsa-1121"
"name": "GLSA-200608-18",
"refsource": "GENTOO",
"url": "http://www.gentoo.org/security/en/glsa/glsa-200608-18.xml"
},
{
"name": "DSA-1122",
@ -83,9 +63,64 @@
"url": "http://www.debian.org/security/2006/dsa-1122"
},
{
"name" : "GLSA-200608-18",
"refsource" : "GENTOO",
"url" : "http://www.gentoo.org/security/en/glsa/glsa-200608-18.xml"
"name": "21452",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/21452"
},
{
"name": "[postgrey] 20050414 Re: Problem with crashing postgrey",
"refsource": "MLIST",
"url": "http://lists.ee.ethz.ch/postgrey/msg00630.html"
},
{
"name": "15517",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/15517"
},
{
"name": "21164",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/21164"
},
{
"name": "20050415 Use of function \"log\" in Perl module Net::Server",
"refsource": "FULLDISC",
"url": "http://marc.info/?l=full-disclosure&m=111354538331167&w=2"
},
{
"name": "21152",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/21152"
},
{
"name": "[postgrey] 20050414 Problem with crashing postgrey",
"refsource": "MLIST",
"url": "http://lists.ee.ethz.ch/postgrey/msg00627.html"
},
{
"name": "21149",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/21149"
},
{
"name": "[postgrey] 20050414 ANNOUNCE: Postgrey 1.21 (SECURITY)",
"refsource": "MLIST",
"url": "http://lists.ee.ethz.ch/postgrey/msg00647.html"
},
{
"name": "postgrey-logging-dos(20108)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/20108"
},
{
"name": "DSA-1121",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2006/dsa-1121"
},
{
"name": "14958",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/14958"
},
{
"name": "MDKSA-2006:131",
@ -96,41 +131,6 @@
"name": "13193",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/13193"
},
{
"name" : "15517",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/15517"
},
{
"name" : "14958",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/14958"
},
{
"name" : "21164",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/21164"
},
{
"name" : "21152",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/21152"
},
{
"name" : "21149",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/21149"
},
{
"name" : "21452",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/21452"
},
{
"name" : "postgrey-logging-dos(20108)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/20108"
}
]
}

View File

@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.red-database-security.com/wp/sql_injection_forms_us.pdf",
"refsource" : "MISC",
"url" : "http://www.red-database-security.com/wp/sql_injection_forms_us.pdf"
},
{
"name": "http://www.securiteam.com/securitynews/5HP0I0UFFI.html",
"refsource": "MISC",
"url": "http://www.securiteam.com/securitynews/5HP0I0UFFI.html"
},
{
"name": "http://www.red-database-security.com/wp/sql_injection_forms_us.pdf",
"refsource": "MISC",
"url": "http://www.red-database-security.com/wp/sql_injection_forms_us.pdf"
},
{
"name": "oracle-forms-query-where-popup-sql-injection(20080)",
"refsource": "XF",

View File

@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.s9y.org/63.html#A9",
"refsource" : "CONFIRM",
"url" : "http://www.s9y.org/63.html#A9"
},
{
"name": "15878",
"refsource": "OSVDB",
@ -66,6 +61,11 @@
"name": "15145",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/15145"
},
{
"name": "http://www.s9y.org/63.html#A9",
"refsource": "CONFIRM",
"url": "http://www.s9y.org/63.html#A9"
}
]
}

View File

@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "http://www.kb.cert.org/vuls/id/JGEI-6BCRCM",
"refsource" : "CONFIRM",
"url" : "http://www.kb.cert.org/vuls/id/JGEI-6BCRCM"
"name": "15421",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/15421"
},
{
"name": "VU#155610",
@ -63,9 +63,9 @@
"url": "http://www.kb.cert.org/vuls/id/155610"
},
{
"name" : "15421",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/15421"
"name": "http://www.kb.cert.org/vuls/id/JGEI-6BCRCM",
"refsource": "CONFIRM",
"url": "http://www.kb.cert.org/vuls/id/JGEI-6BCRCM"
}
]
}

View File

@ -52,25 +52,25 @@
},
"references": {
"reference_data": [
{
"name" : "7683",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/7683"
},
{
"name": "33135",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/33135"
},
{
"name": "4894",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/4894"
},
{
"name": "33393",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/33393"
},
{
"name" : "4894",
"refsource" : "SREASON",
"url" : "http://securityreason.com/securityalert/4894"
"name": "7683",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/7683"
}
]
}

View File

@ -52,6 +52,21 @@
},
"references": {
"reference_data": [
{
"name": "http://www.blackberry.com/btsc/search.do?cmd=displayKC&docType=kc&externalId=KB17118",
"refsource": "CONFIRM",
"url": "http://www.blackberry.com/btsc/search.do?cmd=displayKC&docType=kc&externalId=KB17118"
},
{
"name": "33224",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/33224"
},
{
"name": "http://www.blackberry.com/btsc/search.do?cmd=displayKC&docType=kc&externalId=KB17119",
"refsource": "CONFIRM",
"url": "http://www.blackberry.com/btsc/search.do?cmd=displayKC&docType=kc&externalId=KB17119"
},
{
"name": "20090113 RIM BlackBerry Enterprise Server Attachment Service PDF Distiller 'bitmaps' Heap Overflow Vulnerability",
"refsource": "IDEFENSE",
@ -62,21 +77,6 @@
"refsource": "IDEFENSE",
"url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=764"
},
{
"name" : "http://www.blackberry.com/btsc/search.do?cmd=displayKC&docType=kc&externalId=KB17118",
"refsource" : "CONFIRM",
"url" : "http://www.blackberry.com/btsc/search.do?cmd=displayKC&docType=kc&externalId=KB17118"
},
{
"name" : "http://www.blackberry.com/btsc/search.do?cmd=displayKC&docType=kc&externalId=KB17119",
"refsource" : "CONFIRM",
"url" : "http://www.blackberry.com/btsc/search.do?cmd=displayKC&docType=kc&externalId=KB17119"
},
{
"name" : "33224",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/33224"
},
{
"name": "33534",
"refsource": "SECUNIA",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "cert@cert.org",
"ID": "CVE-2009-0213",
"STATE": "PUBLIC"
},
@ -58,14 +58,9 @@
"url": "http://www.securityfocus.com/archive/1/500689/100/0/threaded"
},
{
"name" : "http://www.scada-security.com/vulnerabilities/areva1.html",
"refsource" : "MISC",
"url" : "http://www.scada-security.com/vulnerabilities/areva1.html"
},
{
"name" : "VU#337569",
"refsource" : "CERT-VN",
"url" : "http://www.kb.cert.org/vuls/id/337569"
"name": "33837",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/33837"
},
{
"name": "33637",
@ -73,9 +68,14 @@
"url": "http://www.securityfocus.com/bid/33637"
},
{
"name" : "33837",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/33837"
"name": "VU#337569",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/337569"
},
{
"name": "http://www.scada-security.com/vulnerabilities/areva1.html",
"refsource": "MISC",
"url": "http://www.scada-security.com/vulnerabilities/areva1.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2012-0331",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-2329",
"STATE": "PUBLIC"
},
@ -52,40 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.php.net/ChangeLog-5.php#5.4.3",
"refsource" : "CONFIRM",
"url" : "http://www.php.net/ChangeLog-5.php#5.4.3"
},
{
"name" : "http://www.php.net/archive/2012.php#id2012-05-08-1",
"refsource" : "CONFIRM",
"url" : "http://www.php.net/archive/2012.php#id2012-05-08-1"
},
{
"name": "https://bugs.php.net/bug.php?id=61807",
"refsource": "CONFIRM",
"url": "https://bugs.php.net/bug.php?id=61807"
},
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=820000",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=820000"
},
{
"name" : "HPSBMU02900",
"refsource" : "HP",
"url" : "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862"
},
{
"name" : "SSRT100992",
"refsource" : "HP",
"url" : "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862"
},
{
"name" : "53455",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/53455"
"name": "php-apacherequestheaders-bo(75545)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75545"
},
{
"name": "49014",
@ -93,9 +68,34 @@
"url": "http://secunia.com/advisories/49014"
},
{
"name" : "php-apacherequestheaders-bo(75545)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/75545"
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=820000",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=820000"
},
{
"name": "http://www.php.net/archive/2012.php#id2012-05-08-1",
"refsource": "CONFIRM",
"url": "http://www.php.net/archive/2012.php#id2012-05-08-1"
},
{
"name": "53455",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/53455"
},
{
"name": "SSRT100992",
"refsource": "HP",
"url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862"
},
{
"name": "HPSBMU02900",
"refsource": "HP",
"url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862"
},
{
"name": "http://www.php.net/ChangeLog-5.php#5.4.3",
"refsource": "CONFIRM",
"url": "http://www.php.net/ChangeLog-5.php#5.4.3"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-2381",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2012-3056",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2012-3207",
"STATE": "PUBLIC"
},
@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "56062",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/56062"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html",
"refsource": "CONFIRM",
@ -61,11 +66,6 @@
"name": "MDVSA-2013:150",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150"
},
{
"name" : "56062",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/56062"
}
]
}

View File

@ -57,15 +57,15 @@
"refsource": "MISC",
"url": "http://www.mobileread.com/forums/showthread.php?s=c7953cc553a4aaa36e880b25aa1a6bf6&t=175368"
},
{
"name" : "http://www.kb.cert.org/vuls/id/MORO-8WKGBN",
"refsource" : "CONFIRM",
"url" : "http://www.kb.cert.org/vuls/id/MORO-8WKGBN"
},
{
"name": "VU#122656",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/122656"
},
{
"name": "http://www.kb.cert.org/vuls/id/MORO-8WKGBN",
"refsource": "CONFIRM",
"url": "http://www.kb.cert.org/vuls/id/MORO-8WKGBN"
}
]
}

View File

@ -62,15 +62,15 @@
"refsource": "MISC",
"url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-213-01.pdf"
},
{
"name" : "http://www.sielcosistemi.com/en/news/index.html?id=69",
"refsource" : "CONFIRM",
"url" : "http://www.sielcosistemi.com/en/news/index.html?id=69"
},
{
"name": "49395",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/49395"
},
{
"name": "http://www.sielcosistemi.com/en/news/index.html?id=69",
"refsource": "CONFIRM",
"url": "http://www.sielcosistemi.com/en/news/index.html?id=69"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2012-4410",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-4455",
"STATE": "PUBLIC"
},
@ -52,11 +52,56 @@
},
"references": {
"reference_data": [
{
"name": "[oss-security] 20120909 Re: CVE request: opencryptoki insecure lock files handling",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/09/09/2"
},
{
"name": "[oss-security] 20120924 Re: CVE request: opencryptoki insecure lock files handling",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/09/25/5"
},
{
"name": "50702",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/50702"
},
{
"name": "55627",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/55627"
},
{
"name": "[oss-security] 20120927 Re: CVE request: opencryptoki insecure lock files handling",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/09/27/2"
},
{
"name": "opencryptoki-file-symlink(78943)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78943"
},
{
"name": "[oss-security] 20120920 Re: CVE request: opencryptoki insecure lock files handling",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/09/20/6"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=730636",
"refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=730636"
},
{
"name": "[Opencryptoki-tech] 20120427 opencryptoki release 2.4.2",
"refsource": "MLIST",
"url": "http://sourceforge.net/mailarchive/message.php?msg_id=29191022"
},
{
"name": "http://opencryptoki.git.sourceforge.net/git/gitweb.cgi?p=opencryptoki/opencryptoki;a=commitdiff;h=5667edb52cd27b7e512f48f823b4bcc6b872ab15",
"refsource": "CONFIRM",
"url": "http://opencryptoki.git.sourceforge.net/git/gitweb.cgi?p=opencryptoki/opencryptoki;a=commitdiff;h=5667edb52cd27b7e512f48f823b4bcc6b872ab15"
},
{
"name": "[oss-security] 20120906 CVE request: opencryptoki insecure lock files handling",
"refsource": "MLIST",
@ -66,51 +111,6 @@
"name": "[oss-security] 20120907 Re: CVE request: opencryptoki insecure lock files handling",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/09/07/6"
},
{
"name" : "[oss-security] 20120909 Re: CVE request: opencryptoki insecure lock files handling",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2012/09/09/2"
},
{
"name" : "[oss-security] 20120920 Re: CVE request: opencryptoki insecure lock files handling",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2012/09/20/6"
},
{
"name" : "[oss-security] 20120924 Re: CVE request: opencryptoki insecure lock files handling",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2012/09/25/5"
},
{
"name" : "[oss-security] 20120927 Re: CVE request: opencryptoki insecure lock files handling",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2012/09/27/2"
},
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=730636",
"refsource" : "MISC",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=730636"
},
{
"name" : "http://opencryptoki.git.sourceforge.net/git/gitweb.cgi?p=opencryptoki/opencryptoki;a=commitdiff;h=5667edb52cd27b7e512f48f823b4bcc6b872ab15",
"refsource" : "CONFIRM",
"url" : "http://opencryptoki.git.sourceforge.net/git/gitweb.cgi?p=opencryptoki/opencryptoki;a=commitdiff;h=5667edb52cd27b7e512f48f823b4bcc6b872ab15"
},
{
"name" : "55627",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/55627"
},
{
"name" : "50702",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/50702"
},
{
"name" : "opencryptoki-file-symlink(78943)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/78943"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-4539",
"STATE": "PUBLIC"
},
@ -52,115 +52,115 @@
},
"references": {
"reference_data": [
{
"name" : "[Xen-announce] 20121113 Xen Security Advisory 24 (CVE-2012-4539) - Grant table hypercall infinite loop DoS vulnerability",
"refsource" : "MLIST",
"url" : "http://lists.xen.org/archives/html/xen-announce/2012-11/msg00002.html"
},
{
"name": "[oss-security] 20121113 Xen Security Advisory 24 (CVE-2012-4539) - Grant table hypercall infinite loop DoS vulnerability",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/11/13/4"
},
{
"name" : "DSA-2582",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2012/dsa-2582"
},
{
"name" : "GLSA-201309-24",
"refsource" : "GENTOO",
"url" : "http://security.gentoo.org/glsa/glsa-201309-24.xml"
},
{
"name" : "GLSA-201604-03",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201604-03"
},
{
"name" : "SUSE-SU-2012:1615",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00001.html"
},
{
"name" : "SUSE-SU-2012:1486",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00008.html"
},
{
"name" : "SUSE-SU-2012:1487",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00009.html"
},
{
"name" : "openSUSE-SU-2012:1572",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html"
},
{
"name" : "openSUSE-SU-2012:1685",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00018.html"
},
{
"name" : "SUSE-SU-2014:0446",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html"
},
{
"name" : "openSUSE-SU-2012:1573",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html"
},
{
"name" : "56498",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/56498"
},
{
"name" : "87305",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/87305"
},
{
"name" : "1027763",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1027763"
},
{
"name" : "51468",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/51468"
},
{
"name" : "51200",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/51200"
},
{
"name" : "51413",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/51413"
},
{
"name" : "51324",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/51324"
},
{
"name" : "51352",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/51352"
},
{
"name": "55082",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/55082"
},
{
"name": "87305",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/87305"
},
{
"name": "51413",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/51413"
},
{
"name": "51200",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/51200"
},
{
"name": "GLSA-201309-24",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-201309-24.xml"
},
{
"name": "DSA-2582",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2012/dsa-2582"
},
{
"name": "1027763",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1027763"
},
{
"name": "SUSE-SU-2012:1486",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00008.html"
},
{
"name": "openSUSE-SU-2012:1685",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00018.html"
},
{
"name": "xen-gnttabopgetstatus-dos(80026)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80026"
},
{
"name": "openSUSE-SU-2012:1572",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html"
},
{
"name": "51468",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/51468"
},
{
"name": "SUSE-SU-2012:1487",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00009.html"
},
{
"name": "[Xen-announce] 20121113 Xen Security Advisory 24 (CVE-2012-4539) - Grant table hypercall infinite loop DoS vulnerability",
"refsource": "MLIST",
"url": "http://lists.xen.org/archives/html/xen-announce/2012-11/msg00002.html"
},
{
"name": "SUSE-SU-2014:0446",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html"
},
{
"name": "51352",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/51352"
},
{
"name": "51324",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/51324"
},
{
"name": "GLSA-201604-03",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201604-03"
},
{
"name": "56498",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/56498"
},
{
"name": "SUSE-SU-2012:1615",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00001.html"
},
{
"name": "openSUSE-SU-2012:1573",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "cert@cert.org",
"ID": "CVE-2012-4940",
"STATE": "PUBLIC"
},
@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "VU#586556",
"refsource" : "CERT-VN",
"url" : "http://www.kb.cert.org/vuls/id/586556"
},
{
"name": "56343",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/56343"
},
{
"name": "VU#586556",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/586556"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2012-6283",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "ics-cert@hq.dhs.gov",
"ID": "CVE-2012-6435",
"STATE": "PUBLIC"
},

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-2023",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -53,6 +53,11 @@
},
"references": {
"reference_data": [
{
"name": "99942",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/99942"
},
{
"name": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0338",
"refsource": "MISC",
@ -62,11 +67,6 @@
"name": "DSA-3923",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2017/dsa-3923"
},
{
"name" : "99942",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/99942"
}
]
}

View File

@ -52,16 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.zerodayinitiative.com/advisories/ZDI-17-030",
"refsource" : "MISC",
"url" : "http://www.zerodayinitiative.com/advisories/ZDI-17-030"
},
{
"name" : "https://helpx.adobe.com/security/products/acrobat/apsb17-01.html",
"refsource" : "CONFIRM",
"url" : "https://helpx.adobe.com/security/products/acrobat/apsb17-01.html"
},
{
"name": "95344",
"refsource": "BID",
@ -71,6 +61,16 @@
"name": "1037574",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1037574"
},
{
"name": "http://www.zerodayinitiative.com/advisories/ZDI-17-030",
"refsource": "MISC",
"url": "http://www.zerodayinitiative.com/advisories/ZDI-17-030"
},
{
"name": "https://helpx.adobe.com/security/products/acrobat/apsb17-01.html",
"refsource": "CONFIRM",
"url": "https://helpx.adobe.com/security/products/acrobat/apsb17-01.html"
}
]
}

View File

@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "99345",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/99345"
},
{
"name": "43450",
"refsource": "EXPLOIT-DB",
@ -62,20 +67,15 @@
"refsource": "MISC",
"url": "https://github.com/artkond/cisco-snmp-rce"
},
{
"name" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170629-snmp",
"refsource" : "CONFIRM",
"url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170629-snmp"
},
{
"name" : "99345",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/99345"
},
{
"name": "1038808",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1038808"
},
{
"name": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170629-snmp",
"refsource": "CONFIRM",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170629-snmp"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "https://github.com/radare/radare2/commit/bd1bab05083d80464fea854bf4b5c49aaf1b8401",
"refsource" : "MISC",
"url" : "https://github.com/radare/radare2/commit/bd1bab05083d80464fea854bf4b5c49aaf1b8401"
},
{
"name": "https://github.com/radare/radare2/issues/10465",
"refsource": "MISC",
"url": "https://github.com/radare/radare2/issues/10465"
},
{
"name": "https://github.com/radare/radare2/commit/bd1bab05083d80464fea854bf4b5c49aaf1b8401",
"refsource": "MISC",
"url": "https://github.com/radare/radare2/commit/bd1bab05083d80464fea854bf4b5c49aaf1b8401"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "https://github.com/fouzhe/security/tree/master/pngwriter",
"refsource" : "MISC",
"url" : "https://github.com/fouzhe/security/tree/master/pngwriter"
},
{
"name": "https://github.com/pngwriter/pngwriter/issues/129",
"refsource": "MISC",
"url": "https://github.com/pngwriter/pngwriter/issues/129"
},
{
"name": "https://github.com/fouzhe/security/tree/master/pngwriter",
"refsource": "MISC",
"url": "https://github.com/fouzhe/security/tree/master/pngwriter"
}
]
}

View File

@ -52,95 +52,95 @@
},
"references": {
"reference_data": [
{
"name" : "45697",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/45697/"
},
{
"name": "45742",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/45742/"
},
{
"name" : "45832",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/45832/"
},
{
"name" : "45908",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/45908/"
},
{
"name" : "45922",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/45922/"
},
{
"name" : "45938",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/45938/"
},
{
"name" : "46142",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/46142/"
},
{
"name": "[xorg-announce] 20181025 X.Org security advisory: October 25, 2018",
"refsource": "MLIST",
"url": "https://lists.x.org/archives/xorg-announce/2018-October/002927.html"
},
{
"name" : "https://www.securepatterns.com/2018/10/cve-2018-14665-xorg-x-server.html",
"refsource" : "MISC",
"url" : "https://www.securepatterns.com/2018/10/cve-2018-14665-xorg-x-server.html"
},
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14665",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14665"
},
{
"name" : "https://gitlab.freedesktop.org/xorg/xserver/commit/8a59e3b7dbb30532a7c3769c555e00d7c4301170",
"refsource" : "CONFIRM",
"url" : "https://gitlab.freedesktop.org/xorg/xserver/commit/8a59e3b7dbb30532a7c3769c555e00d7c4301170"
},
{
"name" : "https://gitlab.freedesktop.org/xorg/xserver/commit/50c0cf885a6e91c0ea71fb49fa8f1b7c86fe330e",
"refsource" : "CONFIRM",
"url" : "https://gitlab.freedesktop.org/xorg/xserver/commit/50c0cf885a6e91c0ea71fb49fa8f1b7c86fe330e"
},
{
"name" : "DSA-4328",
"refsource" : "DEBIAN",
"url" : "https://www.debian.org/security/2018/dsa-4328"
},
{
"name" : "GLSA-201810-09",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201810-09"
},
{
"name" : "RHSA-2018:3410",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2018:3410"
"name": "45922",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/45922/"
},
{
"name": "USN-3802-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3802-1/"
},
{
"name": "https://gitlab.freedesktop.org/xorg/xserver/commit/50c0cf885a6e91c0ea71fb49fa8f1b7c86fe330e",
"refsource": "CONFIRM",
"url": "https://gitlab.freedesktop.org/xorg/xserver/commit/50c0cf885a6e91c0ea71fb49fa8f1b7c86fe330e"
},
{
"name": "45697",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/45697/"
},
{
"name": "RHSA-2018:3410",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:3410"
},
{
"name": "105741",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/105741"
},
{
"name": "45908",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/45908/"
},
{
"name": "https://www.securepatterns.com/2018/10/cve-2018-14665-xorg-x-server.html",
"refsource": "MISC",
"url": "https://www.securepatterns.com/2018/10/cve-2018-14665-xorg-x-server.html"
},
{
"name": "46142",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/46142/"
},
{
"name": "GLSA-201810-09",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201810-09"
},
{
"name": "1041948",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1041948"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14665",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14665"
},
{
"name": "45832",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/45832/"
},
{
"name": "https://gitlab.freedesktop.org/xorg/xserver/commit/8a59e3b7dbb30532a7c3769c555e00d7c4301170",
"refsource": "CONFIRM",
"url": "https://gitlab.freedesktop.org/xorg/xserver/commit/8a59e3b7dbb30532a7c3769c555e00d7c4301170"
},
{
"name": "45938",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/45938/"
},
{
"name": "DSA-4328",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2018/dsa-4328"
}
]
}

View File

@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "1041809",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1041809"
},
{
"name": "https://helpx.adobe.com/security/products/acrobat/apsb18-30.html",
"refsource": "CONFIRM",
@ -61,11 +66,6 @@
"name": "105432",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/105432"
},
{
"name" : "1041809",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1041809"
}
]
}

View File

@ -58,9 +58,9 @@
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1652633"
},
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1652635",
"name": "https://github.com/hfp/libxsmm/issues/287",
"refsource": "MISC",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1652635"
"url": "https://github.com/hfp/libxsmm/issues/287"
},
{
"name": "https://github.com/hfp/libxsmm/commit/151481489192e6d1997f8bde52c5c425ea41741d",
@ -68,9 +68,9 @@
"url": "https://github.com/hfp/libxsmm/commit/151481489192e6d1997f8bde52c5c425ea41741d"
},
{
"name" : "https://github.com/hfp/libxsmm/issues/287",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1652635",
"refsource": "MISC",
"url" : "https://github.com/hfp/libxsmm/issues/287"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1652635"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "security@google.com",
"ASSIGNER": "security@android.com",
"DATE_PUBLIC": "2019-01-01T00:00:00",
"ID": "CVE-2018-9589",
"STATE": "PUBLIC"
@ -53,15 +53,15 @@
},
"references": {
"reference_data": [
{
"name" : "https://source.android.com/security/bulletin/2019-01-01.html",
"refsource" : "CONFIRM",
"url" : "https://source.android.com/security/bulletin/2019-01-01.html"
},
{
"name": "106495",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/106495"
},
{
"name": "https://source.android.com/security/bulletin/2019-01-01.html",
"refsource": "CONFIRM",
"url": "https://source.android.com/security/bulletin/2019-01-01.html"
}
]
}